Software House, part of Tyco Security Products, has announced several significant enhancements to its C•CURE 9000 security and event management system to offer new speed, functionality and scalability, making it one of the most powerful systems available on the market today.
New to C•CURE 9000 are predefined alarm response messages, which enable organisations to adapt specific steps to take in the event of any system alarm. This functionality can provide detailed step-by-step instructions for security personnel and operators, ensuring continuity in response across the organisation.
With C•CURE 9000, users can leverage the escorted access feature, where select cardholders may be designated as escorted visitors requiring an escort to obtain access to certain restricted areas within a facility.
A new scalable, intuitive personnel record import from CSV files allows companies that utilise C•CURE 9000 to easily import cardholder information from multiple systems such as ERP and IT.
C•CURE 9000 has been upgraded to Microsoft .NET Framework 4, making it one of the fastest and most secure systems in the industry. By offering native encryption and XML data transfer, security managers can expect the system to maintain its lightning fast processing of transactions during peak-volume times of the day.
"We continue to add critical features to C•CURE 9000 that make it a more powerful and efficient part of a company's overall business operation," said Steve Lewis, C•CURE 9000 Product Manager for Tyco Security Products. "Features like escorted access and pre-defined security messages give security personnel more control over access points while improving responsiveness to emergency situations."
Software House modifies C•CURE 9000 security and event management system for speed and functionality
- Related companies
- Software House
- Tyco Security Products
- Related categories
- Access control systems & kits
- Access control software
- View all news from
- Software House
- Tyco Security Products
Related videos
In case you missed it

As cutting-edge trends go, convergence has been around for at least two decades. The meaning has shifted over the years, and if anything, the idea of convergence has gotten even mo...

AI has the potential to enhance the usability of traditionally complex access control and physical security systems. The application of AI (artificial intelligence) within access c...

March is Women in Security Month, a time dedicated to celebrating and promoting the contributions of women in the security field—particularly in cybersecurity. This observa...
Latest products
A modern guide to data loss prevention
Download7 proven solutions for law enforcement key control and asset management
DownloadThe truth behind 9 mobile access myths
DownloadAccess control system planning phase 2
DownloadSecurity practices for hotels
Download